Category Archives: IT Strategy/Transformation

User Access – Time for a change?

User expectations and the range of devices they use to access IT systems are growing[...]

Migrating to Windows Server 2012

Extended support for Windows Server 2003 ends on 14 July 2015, so you need to[...]

End User Computing:

This paper is written for business executives and managers with an interest in how technology[...]

Mobile security is more than protecting local data

By now we’ve all heard the term Bring Your Own Device (BYOD). This phenomenon is[...]

What are APT’s?

What is an APT? APT stands for Advanced Persistent Threat. The goal of this form[...]

Say What?

Recently I attended the IBM Security Systems Analyst Meet the Experts day in Heathrow. With[...]

Security: the oft-forgotten dimension

Computer security is a hot topic today, and much talked about. There are endless emanations[...]

Juggling Performance, Availability and Security

By Tony Lock A recent report from Freeform Dynamics illustrates that many corporate networks are[...]

Controlling Application Access

Application performance, availability and security challenges are quietly creeping up in the context of internal[...]

Predictions for 2014

My views on market developments in 2014 are not sensational, I’m afraid. I offer them[...]

Will the CMO inherit the Earth?

By Dale Vile Two narratives concerning the CIO/CMO relationship are doing the rounds at the[...]

Voice recognition in healthcare

By Dale Vile I first discovered dictation software back in 2001 when I ended up[...]

Software Defined Networking (SDN) continues to move forwards

By Charles Brett and Tony Lock During an Analyst Briefing at the IBM Development Laboratory[...]

Social Business and unknown unknowns

By Charles Brett At an Analyst Briefing in London in late September IBM described what[...]

Device Proliferation and Data Fragmentation

By Tony Lock Bring your own device (BYOD) continues to attract considerable attention, but the[...]

Clouds and the Data Centre weather forecast

By Tony Lock Enterprise Data Centres are complex collections of systems acquired over long spans[...]

The End User Security Jigsaw

Organisations of all sizes are trying to understand the security implications of mobile working, device[...]

The Data Protection Imperative

In this short paper, we spell out why the time has come to adopt a[...]

Data Protection as a Business Enabler

While the importance of business information is almost universally recognised, few organisations have enjoyed either[...]

Storage Anywhere and Everywhere

With more departmental applications, collaboration and sharing environments, and even cloud-based services, with access via[...]

Don’t forget the desktop

By Dale Vile Ask anyone in the industry about the future of end user computing[...]

DCIM and Energy Management

By Tony Lock Over several decades IT management has focussed almost exclusively on keeping servers[...]

Speeding up ‘Change’

By Tony Lock For much of the last decade ‘IT’ has become something of a[...]

Empowering your users the ‘right way’

By Tony Lock Many organisations say their people are among the most valuable assets they[...]

© Freeform Dynamics Limited - 2006 - 2024. All rights reserved. Unauthorised use of copy is not permitted.